AGL 40.02 Decreased By ▼ -0.01 (-0.02%)
AIRLINK 127.99 Increased By ▲ 0.29 (0.23%)
BOP 6.66 Increased By ▲ 0.05 (0.76%)
CNERGY 4.44 Decreased By ▼ -0.16 (-3.48%)
DCL 8.75 Decreased By ▼ -0.04 (-0.46%)
DFML 41.24 Decreased By ▼ -0.34 (-0.82%)
DGKC 86.18 Increased By ▲ 0.39 (0.45%)
FCCL 32.40 Decreased By ▼ -0.09 (-0.28%)
FFBL 64.89 Increased By ▲ 0.86 (1.34%)
FFL 11.61 Increased By ▲ 1.06 (10.05%)
HUBC 112.51 Increased By ▲ 1.74 (1.57%)
HUMNL 14.75 Decreased By ▼ -0.32 (-2.12%)
KEL 5.08 Increased By ▲ 0.20 (4.1%)
KOSM 7.38 Decreased By ▼ -0.07 (-0.94%)
MLCF 40.44 Decreased By ▼ -0.08 (-0.2%)
NBP 61.00 Decreased By ▼ -0.05 (-0.08%)
OGDC 193.60 Decreased By ▼ -1.27 (-0.65%)
PAEL 26.88 Decreased By ▼ -0.63 (-2.29%)
PIBTL 7.31 Decreased By ▼ -0.50 (-6.4%)
PPL 152.25 Decreased By ▼ -0.28 (-0.18%)
PRL 26.20 Decreased By ▼ -0.38 (-1.43%)
PTC 16.11 Decreased By ▼ -0.15 (-0.92%)
SEARL 85.50 Increased By ▲ 1.36 (1.62%)
TELE 7.70 Decreased By ▼ -0.26 (-3.27%)
TOMCL 36.95 Increased By ▲ 0.35 (0.96%)
TPLP 8.77 Increased By ▲ 0.11 (1.27%)
TREET 16.80 Decreased By ▼ -0.86 (-4.87%)
TRG 62.20 Increased By ▲ 3.58 (6.11%)
UNITY 28.07 Increased By ▲ 1.21 (4.5%)
WTL 1.32 Decreased By ▼ -0.06 (-4.35%)
BR100 10,081 Increased By 80.6 (0.81%)
BR30 31,142 Increased By 139.8 (0.45%)
KSE100 94,764 Increased By 571.8 (0.61%)
KSE30 29,410 Increased By 209 (0.72%)

imageWASHINGTON: The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday.

The New York Times reported that the NSA has implanted software on 100,000 computers around the world to be able to conduct surveillance, and which gives the spy agency "a digital highway" for launching cyberattacks.

The Times, citing unnamed sources, said the agency has used the program code-named Quantum since at least 2008, relying on a covert channel of radio waves that can be transmitted from tiny circuit boards and cards inserted surreptitiously into the computers.

It said the radio technology has helped solve a key problem for US intelligence agencies, by getting into computers of adversaries that are hardened against attacks. But it noted that the radio frequency hardware must in most cases be physically inserted by a spy, a manufacturer or an unwitting user.

The report said the NSA and its Pentagon partner, United States Cyber Command, have used these techniques against the Chinese Army, which has been accused of cyberattacks on US firms.

It has also been used against Russian military networks, Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and documents cited by the US newspaper.

In a statement to AFP, the NSA did not directly comment on the report but said the agency "deploys various foreign intelligence techniques to help defend the nation."

"As we have previously stated, the implication that NSA's collection is arbitrary and unconstrained is false. NSA's activities are focused and specifically deployed against -- and only against -- valid foreign intelligence targets in response to intelligence requirements," the statement said.

"In addition, we do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of -- or give intelligence we collect to -- US companies to enhance their international competitiveness or increase their bottom line."

White House spokesman Jay Carney, asked about the report, echoed the NSA comments.

"I won't discuss specific tools. But the NSA operates under heavy oversight and is focused on discovering and developing intelligence about valid foreign intelligence targets such as terrorists, human traffickers and drug smugglers," Carney told reporters on Air Force One.

"They are not interested in the personal information about ordinary Americans."

President Barack Obama is due to unveil proposals Friday to reform US intelligence in the wake of a series of revelations which have stunned US allies and others on the vast data-gathering capabilities of the spy agencies, based on leaked documents from former NSA contractor Edward Snowden.

Comments

Comments are closed.